default search action
Devkishen Sisodia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Yebo Feng, Jun Li, Devkishen Sisodia, Peter L. Reiher:
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic. IEEE Trans. Dependable Secur. Comput. 21(4): 2211-2226 (2024) - [j3]Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam:
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications. ACM Trans. Internet Things 5(2): 8:1-8:31 (2024) - 2023
- [j2]Jun Li, Devkishen Sisodia, Shad Stafford:
On the Detection of Smart, Self-Propagating Internet Worms. IEEE Trans. Dependable Secur. Comput. 20(4): 3051-3063 (2023) - [c10]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Toward Adaptive DDoS-Filtering Rule Generation. CNS 2023: 1-9 - [i1]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Adaptive Distributed Filtering of DDoS Traffic on the Internet. CoRR abs/2305.13296 (2023) - 2022
- [c9]Yebo Feng, Jun Li, Devkishen Sisodia:
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic. RAID 2022: 482-494 - 2020
- [c8]Devkishen Sisodia, Jun Li, Lei Jiao:
In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection. AsiaCCS 2020: 153-164 - [c7]Yebo Feng, Devkishen Sisodia, Jun Li:
POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic. AsiaCCS 2020: 907-909 - [c6]Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li:
Bridging Missing Gaps in Evaluating DDoS Research. CSET @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [j1]Tianchong Gao, Wei Peng, Devkishen Sisodia, Tanay Kumar Saha, Feng Li, Mohammad Al Hasan:
Android Malware Detection via Graphlet Sampling. IEEE Trans. Mob. Comput. 18(12): 2754-2767 (2019) - [c5]Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher:
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic. IM 2019: 180-188 - 2018
- [c4]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. ICCCN 2018: 1-9 - [c3]Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:
Securing the Smart Home via a Two-Mode Security Framework. SecureComm (1) 2018: 22-42 - 2017
- [c2]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
Source-End DDoS Defense in IoT Environments. IoT S&P@CCS 2017: 63-64 - 2016
- [c1]Wei Peng, Tianchong Gao, Devkishen Sisodia, Tanay Kumar Saha, Feng Li, Mohammad Al Hasan:
ACTS: Extracting Android App topologiCal signature through graphleT Sampling. CNS 2016: 37-45
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint